Enhanced Data Storage Security and Trust Environment in Cloud Computing

نویسندگان

  • Arif Sultana Shaik
  • S. Rama Krishna
چکیده

Cloud computing plays an important role in data sharing or transfer of information from one place to another. The services provides by the cloud is greatly enjoyed by the user. The storage of the user’s data in the cloud provides the high standard of qualities and more enjoyable services to the users. The data of the user is automatically stored in the cloud without encumber the software and hardware tools. In cloud data storage, it provides many benefits to the users in an evidently. In this cloud storage, new type of risk arisen in the correctness of the users storage data or information. To overcome the above issue in the cloud, we propose new flexible auditing mechanisms in this paper. In order to address the new obstacle and for further perfect secure about the user’s data and dependable cloud storage services is propose in this paper. Through this proposal data or information of the user utilizing the similarity token used and distributed erasure-coded information also used. Our proposed mechanism helps the data storage in the lightweight data transfer with less cost and provides the storage correctness assure in the cloud storage. The proposed design helps us to find the information or data error localization. Our proposed design supports for the full secure about the storage data of the user and effective outsource data. It also significant in updating, deletion and append of the user data. Our proposed algorithm protects the user’s information from the several types of attacks as shown in our experimental analysis. Keywords— Data integrity, dependable distributed storage, error localization, data dynamics, cloud computing, attacks, user’s data, software and hardware.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

Data Replication-Based Scheduling in Cloud Computing Environment

Abstract— High-performance computing and vast storage are two key factors required for executing data-intensive applications. In comparison with traditional distributed systems like data grid, cloud computing provides these factors in a more affordable, scalable and elastic platform. Furthermore, accessing data files is critical for performing such applications. Sometimes accessing data becomes...

متن کامل

DoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation

Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...

متن کامل

A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security

In order to determine the user’s trust is a growing concern for ensuring privacy and security in a cloud computing environment. In cloud, user’s data is stored in one or more remote server(s) which poses more security challenges for the system. One of the most important concerns is to protect user’s sensitive information from other users and hackers that may cause data leakage in cloud storage....

متن کامل

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014